This course provides an overview of some of the best practices for using AWS security services and control mechanisms. This course helps you understand your responsibilities, while providing valuable guidelines for how to keep your workload safe and secure. You learn how to secure your network infrastructure using sound design options. You also learn how you can harden your compute resources and manage them securely. Finally, this course helps you understand AWS monitoring and alerting so you can detect and alert on suspicious events. This will help you quickly begin the response process in the event of a potential compromise.
Course Objectives
In this course, you learn how to:
- Design and implement a secure network infrastructure
- Design and implement compute security
- Design and implement a logging solution
Intended Audience
This course is intended for:
- Solutions architects and security engineers
Prerequisites
We recommend that attendees of this course have:
- Security Fundamentals or AWS Security Essentials Â
- A strong background in information security concepts, techniques, and paradigms in the area of networking, operating systems, data encryption, and operational controls
Course Outline
- Module 1 – Security Overview
- Module 2 – Securing the Network
- Module 3 – Compute Security
- Module 4 – Monitoring and Alerting